AFDX/ARINC 664 Concept, Design, Implementation and Beyond

Size: px
Start display at page:

Download "AFDX/ARINC 664 Concept, Design, Implementation and Beyond"

Transcription

1 SYSGO White Paper White Paper AFDX/ARINC 664 Concept, Design, Implementation and Beyond By Detlev Schaadt, CTO, SYSGO AG

2 Whitepaper AFDX/ARINC 664 Concept, Design, Implementation and Beyond Introduction Avionic Full-Duplex Switched Ethernet (AFDX), designated ARINC 664, is a specification for a deterministic aircraft data network bus for aeronautical, railway and military systems. The network is based on standard IEEE Ethernet technology. The benefits from using commercial-off-the-shelf (COTS) Ethernet components include reduced overall costs, faster system development and less-costly maintenance for the system network. Hardware components, cables and test equipment for Ethernet are field proven and much more affordable than built-to-spec avionics solutions. Standard commercial grade Ethernet won t meet avionics network requirements. Therefore, AFDX extends the Ethernet standard by adding Quality of Service (QoS) and deterministic behavior with a guaranteed dedicated bandwidth. AFDX is currently used in the Airbus A380 and A400M as well as in the Boeing 787 Dreamliner. History of Avionic Data Busses Aircraft control systems generally consist of a number of sensors to read environmental or inertial data, an avionic system performing a certain flight relevant control function and outputs, for instance to control actuators to perform rudder or flap movements. There always has been a need to interconnect between these components and traditionally, a set of sensors and actuators have been connected to one avionics function. The main data busses used for these purposes where ARINC-429 and MIL-STD The following sections will give a brief overview of these technologies. ARINC-429 ARINC-429 is a two-wire data bus that is application-specific for commercial and transport aircraft. The connection wires are twisted pairs. Words are 32 bits in length and most messages consist of a single data word. The specification defines the electrical and data characteristics and protocols. ARINC 429 uses a unidirectional data bus standard (Tx and Rx are on separate ports) known as the Mark 33 Digital Information Transfer System (DITS). Messages are transmitted at either 12.5 or 100 Kbit/s to other system elements that are monitoring the bus messages. The transmitter is always transmitting either 32-bit data words or the NULL state. No more than 20 receivers can be connected to a single bus (wire pair). MIL-STD 1553 MIL-STD-1553 is military standard published by the United States Department of Defense (DoD) that defines the mechanical, electrical and functional characteristics of a serial data bus. It was originally designed for use with military avionics, but has also become commonly used in spacecraft on-board data handling (OBDH) subsystems, both military and civil. It features a dual redundant balanced line physical layer, a (differential) network interface, time division multiplexing, half-duplex command/response protocol and up to 31 remote terminals (devices). The communication speed rated up to 1 Mbit per second. All communication on the bus is initiated by the bus controller, which polls the remote terminals to send or receive data. It was first published as a U.S. Air Force standard in 1973, and was first used on the F-16 Fighting Falcon fighter aircraft. It is widely used now by all branches of the U.S. military and has been adopted by NATO as STANAG 3838 AVS. IMA requires new communication capabilities A number of innovations and changes are delivering new capabilities to aircraft operations. Modern aircrafts are equipped with numerous electronic components. Some of them like flight control and guidance systems provide flight critical functions, while others may provide assistance services that are not critical to maintain airworthiness, but reduce the workload of the crew. The amount of capabilities is increasing, and so is the amount of information that needs to be processed and displayed. The industry more and more requires a flexible and scalable standard architecture to support the broad spectrum of capabilities and performance with standardized interfaces to fit a wide range of aircrafts. Simultaneously a need exists to improve factors like system dispatchability, reliability and maintainability while at the same time reducing the physical dimensions of size, weight, number of connectors, etc. To reduce lifecycle and construction costs, the usage of common system building blocks with high levels of reuse is aimed at. Consequently, the aircraft manufacturers as well as the main function suppliers for avionic subsystems have been thinking about a new architecture for avionic systems, providing a standardized hosting platform for avionic applications. The idea of Integrated Modular Avionic (IMA) was born and it is quite simple: A general purpose computing platform provides the computational power The interfaces to sensors and actuators are standardized and provided on separate I/O boards The computing platform provides a real-time operating system (RTOS) with a standard interface (API) to avionic applications The IMA approach introduces a number of advantages over the traditional solutions, as resources can now be shared, computational power can be added to the system, if growth concepts requires additional performance. Standardized platform software provides standard functionality common to all subsystems, like maintenance functions, data loading functions, BITE, etc. The IMA concept goes as far as allowing multiple avionic applications to execute on one computing module in so called partitions. To retain fault containment within partition boundaries, the underlying operating system is required to provide strict partitioning of CPU-time and other resources, like memory, common I/O channels, or communication paths. While most of the avionic software applications still anticipate data communication and distribution over ARINC-429, a new network infrastructure was needed to reflect the new flexibility in aircraft system design and cope with the mere number of interconnections between avionic subsystems. 2

3 AFDX, the next generation avionic data network The solution to the new challenge is to use commercially proven hardware base technology and apply a protocol to it, capable of delivering the reliability in packet transport and timing. Asynchronous Full Duplex Switched Ethernet (AFDX) is based on standard IEEE /100 Mbit Ethernet hardware. This is a well known standard and it is widely used. The packets are enveloped as IP and UDP packets, a software protocol known from the internet. However, the base requirements for a network for avionics applications are not covered by standard technology: reliable packet transport bounded transport latency Special extensions to the network protocol and a fixed topology are needed to meet these requirements. The AFDX protocol has been standardized by an ARINC working group. ARINC-664 describes aircraft data networks (AND) and part 7 specifically deals with AFDX. Flexible Network Topology Normal Ethernet technology uses a topology where each node is treated equally. If a peer wants to transmit a packet on the network and the media is occupied, a collision occurs, the peer backs up and tries again, until the transmission is successful, or a predefined amount of time has elapsed. This behavior introduces variable length latency, which is not tolerable in safety critical applications. In order to avoid collisions on the network, a switched full duplex topology is introduced. Figure 1: AFDX Topology Overview Regular switches forward packets according to a connection table, which is build and updated while the switch is in operation; it learns and forgets about the peers connected to it. Of course, this technique is very appropriate in a network with temporary peers that attach and detach from the net. The process of learning however, introduces variable latency and has to be eliminated in an avionic data network. Consequently, an AFDX switch forwards packets according to a static table. This is, in fact, a general policy in this network to statically define all peers and their respective network addresses. There is no address resolution protocol (ARP) necessary to resolve MAC addresses from IP addresses. To increase availability of the network, it is build using redundancy on the physical layer. Each packet is transmitted simultaneously by two Ethernet controllers onto separate wires, via physically separate switches to the destination system. Figure 2: AFDX messages are sent redundant Here, two separate Ethernet controllers receive the frame and a redundancy management algorithm in the protocol layer forwards at most one of the two identical packets appropriately to upper layers. Physical redundancy can be configured on a per connection basis, allowing less data links with fewer requirements for availability to utilize the additional bandwidth offered by the second data link. Sub Systems, AFDX End Systems and Switches An AFDX network consists of so called End Systems and switches. An End System is a component connected to the AFDX network and capable of handling all AFDX related protocol operations. Usually, an End System is part of an avionic or aircraft subsystem, which needs to send or receive data over the AFDX network. One or more switches, depending on the network hierarchy, are located on the data path between two End Systems. In order to decouple transmit operation from data reception all data paths use separate data buffers, thus creating true full duplex data links between End Systems. While this enables data communication using full wire speed between End System end AFDX switch, it becomes obvious that the bottleneck appears at the connection between switches. Here, all traffic appears that has to leave the switch and the sum of the individual transmission rates may easily be larger than the capacity of the inter switch data link. It has been mentioned previously that AFDX at the application level is intended to replace ARINC-429 connections. With ARINC- 429 representing point-to-point or point-to-multipoint connections, it is not surprising, that AFDX has the same characteristics. The point-to-point and point-to-multipoint connections are represented by virtual links (VL). A single VL may connect exactly two End Systems, in which case it represents a point-to-point connection. It may also connect one sending End System with multiply reading End Systems, in which case it represents a point-to-multipoint (multicast) connection. The advantages of this architecture lie in the fact that AFDX presents itself compatible at the application level and saves a large amount of cable runs by multiplexing many individual VLs onto a single wire connection, utilizing the increased bandwidth of a 100Mbit Ethernet connection. The VL-bundle is demultiplexed at the destination switch and forwarded to the appropriate End Systems. Many protocol features that have been introduced to IP or even TCP layers have to do with the fact that a peer to peer connection via 3

4 Whitepaper AFDX/ARINC 664 Concept, Design, Implementation and Beyond Figure 3: AFDX Subsystem to Switch communication Internet is inherently unsafe. Often, the route between peers is not known up front, it may even change during the session. Large packets are fragmented and re-assembled on their way from sender to recipient and sometimes, packets are received out of order. An avionics real-time capable network like AFDX is not exposed to many of these scenarios. In principle, all network parameters are known and constant and the resulting IP layer can be a lean implementation, free of fallback and retry algorithms. Key parameters are the fact that packet fragmentation is indeed possible to allow for packets larger than the MTU at application level. However, the network guarantees all packets to be ordinal integer. Host Communication API In section 1 it was mentioned that the AFDX technology has to be viewed in the context of IMA technology. The industry has also standardized on an API for IMA Systems; the name of this standard is ARINC-653 APEX. This API defines so called Ports as only means for an application to exchange data with entities outside their own context. This entity may be a local device driver accessing local hardware, or an endpoint of a data channel to a remote computer. The advantages of such an approach are obvious: The application uses a unified API to exchange data. The Channel is configured independently from the Ports at the module integration level. Thus, a change in channel configuration is transparent to the application using the Port. The ARINC-653 APEX defines Queuing Ports and Sampling Ports. Queuing Ports A Queuing Port is message oriented; a queue with a preconfigured depth accepts messages until all space is occupied. Further attempts to place a message in the queue will result in the application to wait until there is room for data, if the Port operates in blocking mode. A single source Queuing Port can only connect to exactly one destination port (1:1 relation). Sampling Ports In principle, a Sampling Port is a Queuing Port with a queue depth of one message. Consequently, a new message overwrites an old message, if the message has not been consumed yet. The configuration allows specifying a so called refresh rate. The age of a message is compared against the refresh rate and depending on the result a read service call returns the data s validity. It is possible to connect one source port to multiple destination ports (1:n relation). The port API supports functions to open and write to source ports and functions to open and read from destination ports. Service calls operating on sampling ports never block the caller. Figure 5: Sampling Port Principle Service Access Point (SAP) Ports While ARINC-653 defines two different port types, a third type exists for AFDX, the Service Access Point (SAP) port. In principle, this port type is defined to be a Queuing Port which makes additional parameters available to the API. The requirement for such a SAP port is the ability to communicate with a legacy TCP/IP based network (Compliant Network). Such communication is used for file transfers to file servers or to update an avionic system with new software. In order to communicate with a Compliant Network, a transmitting ES has the ability to specify the destination address: IP address and port number. For this purpose, these addresses are made available when the ES receives a request from the compliant network. 4 Figure 4: Queuing Port Principle The exact API for the SAP port is not specified in the standard; it is however appropriate to use a subset of the well known Berkley UNIX Socket API.

5 Figure 6: Virtual Link topology The Virtual Link Concept One of the most desirable features of an ARINC-429 connection was the fact that it represented a private line between sender and recipient(s) of data. The physical bandwidth of the connection was available at all times, and no concurrent transmit requests occurred. This degree of separation is mandatory when interconnecting avionic systems with different levels of criticality. The AFDX technology achieves this separation by introducing the concept of Virtual Links (VL). Each logical connection is represented by a Virtual Link, thus providing the same properties as a legacy ARINC-429 connection: a unidirectional private line with bounded latency and guaranteed bandwidth. The identification of a given VL is accomplished by using 16 Bit of the 48 Bit MAC address as VL id. Since the IEEE standard allows multicast packet transmission on the Ethernet it is possible to use the standard mechanism to allow a packet to be routed to multiple destination nodes. One of the properties of AFDX however is the fact that a VL may have one and only one End System sending into it. The bandwidth control is achieved by the timing constraints associated to each VL. The mapping of the VL into the global switched network realizes a partitioning of the topology; each VL has an associated time fragmentation called BAG (Bandwidth Allocation Gap) and a maximum frame size. The BAG associated to each VL is the precise time unit between two consecutive IP frames sent by the End System. A VL may not use all the bandwidth, i.e. the time between two consecutive packets may be larger than BAG. However, it may not be smaller than BAG and it is the responsibility of the End System to enforce this. The ARINC-664 specification allows for BAG values in the range of 1 128ms in units of 2n (BAG = 2n, n = {0 7}). The following graphic illustrates the effects of the traffic regulation for a single virtual link. No frame will be transmitted while a VL is eligible but has no data for transmission. When outbound packet streams from multiple VLs are merged for transmission, it is possible that more than one VL has a packet ready and eligible for transmission, due to equal or multiple BAG values. This is a legal case and the packet scheduler needs to serialize the packets, thus introducing a queuing delay (jitter) to the BAG. Figure 9: Unregulated BAG flow before scheduling Figure 10: Regulated BAG flow (single VL) Figure 11: Model of the Scheduled Flow Control Mechanism Figure 7: The BAG in a VL for a maximum bandwidth data flow Figure 8: The BAG in a VL for a non maximum bandwidth data flow At the output of the scheduler, for a given Virtual Link, frames can appear in a bounded time interval. This interval is defined as the maximum admissible jitter. This jitter is introduced by the scheduler and not by the traffic flow itself. The VLs with the same BAG are therefore aggregated into fixed time slots, which guarantee the maximum jitter of the transmission. Transmit Scheduling It is the responsibility of the End System to regulate all outbound traffic according to the allocated time budgets of each virtual link. Therefore transmission for a given VL is blocked until the BAG has elapsed. SNMP and ICMP Every AFDX End System is part of a larger scale aircraft data network, which has a number of functional requirements, safety related requirements, and availability requirements to fulfill. Such a network must be managed to detect and isolate faulty components 5

6 Whitepaper AFDX/ARINC 664 Concept, Design, Implementation and Beyond quickly. The Simple Network Management Protocol (SNMP) has been developed as common network standard to manage large networks and its components. SNMP is based on the manager/agent model consisting of a manager, an agent, a database of management information, managed objects and the network protocol. The manager provides the interface between the human network manager and the management system. The agent provides the interface between the manager and the physical device(s) being managed. Figure 12: SNMP is based on the manager/agent model of a network management architecture. The manager and agent use a Management Information Base (MIB) and a relatively small set of commands to exchange information. The MIB is organized in a tree structure with individual variables, such as point status or description, being represented as leaves on the branches. A long numeric tag or object identifier (OID) is used to distinguish each variable uniquely in the MIB and in SNMP messages. SNMP uses five basic messages (GET, GET-NEXT, GET-RESPONSE, SET, and TRAP) to communicate between the manager and the agent. The GET and GET-NEXT messages allow the manager to request information for a specific variable. The agent, upon receiving a GET or GET-NEXT message, will issue a GET-RESPONSE message to the manager with either the information requested or an error indication as to why the request cannot be processed. A SET message allows the manager to request a change be made to the value of a specific variable in the case of an alarm remote that will operate a relay. The agent will then respond with a GET-RESPONSE message indicating the change has been made or an error indication as to why the change cannot be made. The TRAP message allows the agent to spontaneously inform the manager of an important event. The small number of commands used is only one of the reasons SNMP is simple. The other simplifying factor is its reliance on an unsupervised or connectionless communication link. This simplicity has led directly to its widespread use, specifically in the Internet Network Management Framework. Within this framework, it is considered robust because of the independence of the managers from the agents, e.g. if an agent fails, the manager will continue to function, or vice versa. Implementing AFDX The AFDX technology has successfully been deployed in the Airbus A380 program; the fact that newer programs like A400M or Boeings 787 Dreamliner are following this path shows that this technology will emerge into subsequent aircraft development programs. In principle there are two ways to construct a general purpose End System for AFDX: On the A380 all End Systems are built around ASIC technology, which means that the AFDX protocol has been implemented as hardware, using programmable logic devices. Such an approach inherently has higher performance capabilities and can be easier to certify. On the other hand, the two main technology integrators Airbus and Boeing have already created significant deviations from the ARINC-664 standard and certain flexibility is required to accommodate to these differences. An alternate method to build an AFDX End System is to use an embedded CPU and design the necessary hardware around it, i.e. memory, two Ethernet controllers, communication interface to avionic. In this case the complete AFDX protocol stack runs as firmware on the embedded CPU. In general, it is necessary to have the AFDX protocol implemented on a separate hardware to offload the main CPU from the timing and performance requirements of the AFDX protocol. The host CPU has real-time requirements allocated to it, and therefore the effects of network traffic must be decoupled from it. However, there may be LRU designs which have only little AFDX performance requirements. For such systems, it is feasible to implement the software stack and the application software on a single CPU. Such design freedom already shows the main advantage of a software implementation of the AFDX protocol: the flexibility in design is outstanding compared to a hardware implementation. It has been mentioned that the standard already faces deviations introduced from real-world implementations and further performance requirements and/or technology changes will certainly lead to changes (or enhancements) in the protocol. The desire to use Gigabit Ethernet for instance is a good example. It is inherently easier to make changes to software than to change a hardware design. A software implementation on a separate CPU includes the agents for ICMP and SNMP; a clear advantage over a hardware implementation where these handlers would be in responsibility of the host CPU (and use a certain percentage of the CPU time budget). Figure 13: SYSGO AFDX solution architecture 6

7 Glossary AFDX APEX ARINC ASIC End System BAG Frame IMA MAC SAP Skew SN SNMP ICMP VL Avionics Full Duplex Switched Ethernet. Application Executive, as specified in [ARINC653]. Aeronautical Radio Incorporation. Application-specific integrated circuit. An integrated circuit (IC) customized for a particular use, rather than intended for general-purpose use. An active AFDX client, connected to an AFDX Network to communicate with other clients respecting AFDX rules is called an End-System. It is the subsystem part which must be embedded in each avionics equipment, connected to the AFDX network to communicate with the other AFDX clients. Bandwidth Allocation Gap: minimal gap between sending time of two consecutive frames for a VL. The AFDX protocol is based on the IEEE frame principle: this is the minimum information unit transferred in an AFDX link, including protocol encapsulation information. Integrated Modular Avionics. Medium Access Control. Service Access Point: this is a particular AFDX Port for low-level applications, for frame transmission instead of highest level messages. Time difference in the arrival of redundant frame copies for both networks. Sequence Number: this a byte added to the AFDX frame payload to manage the redundancy. Simple Network Management Protocol Internet Control Message Protocol. One of the core protocols of the Internet protocol suite. It is mainly used by networked computers operating systems to send error messages indicating, for instance, that a requested service is not available or that a host or router could not be reached. Virtual Link: the communication channels used to transfer user s data from an End-System to one or more End Systems, across the switched AFDX network. WP_AFD_10_A4_R by SYSGO AG. All rights reserved. SYSGO, ELinOS, PikeOS, CODEO, COGNITO, and other SYSGO products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of SYSGO AG in Germany and in several other countries all over the world. All other product and service names mentioned are the trademarks of their respective companies. Data contained in this document serves informational purposes only. National product specifications may vary. These materials are subject to change without notice. These materials are provided by SYSGO AG for informational purposes only, without representation or warranty of any kind, and SYSGO AG shall not be liable for errors or omissions with respect to the materials. The only warranties for SYSGO AG products and services are those that are set forth in the express warranty statements accompanying such products and services, if any. SYSGO AG Am Pfaffenstein 14 D Klein-Winternheim Phone Fax

Jean Parrend 1/6 SNMP. Content. 1. Introduction...1

Jean Parrend 1/6 SNMP. Content. 1. Introduction...1 Jean Parrend 1/6 SNMP Content 1. Introduction...1 2. SNMP architecture 1 3. The Management Information Base...3 4. Packet types and structure..4 5. Layered communication...5 Traversing the layers 6. References.6

More information

AFDX / ARINC 664. Tutorial

AFDX / ARINC 664. Tutorial AFDX / ARINC 664 Tutorial 700008_TUT-AFDX-EN_1000 29/08/2008 Imprint Document Title AFDX / ARINC 664 Tutorial Document ID 700008_TUT-AFDX-EN_1000 Issue 1000 Classification Public Project AFDX / ARINC 664

More information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.

More information

White Paper Abstract Disclaimer

White Paper Abstract Disclaimer White Paper Synopsis of the Data Streaming Logical Specification (Phase I) Based on: RapidIO Specification Part X: Data Streaming Logical Specification Rev. 1.2, 08/2004 Abstract The Data Streaming specification

More information

AFDX networks. Computers and Real-Time Group, University of Cantabria

AFDX networks. Computers and Real-Time Group, University of Cantabria AFDX networks By: J. Javier Gutiérrez ([email protected]) Computers and Real-Time Group, University of Cantabria ArtistDesign Workshop on Real-Time System Models for Schedulability Analysis Santander,

More information

Understanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX

Understanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX APPENDIX A Introduction Understanding TCP/IP To fully understand the architecture of Cisco Centri Firewall, you need to understand the TCP/IP architecture on which the Internet is based. This appendix

More information

Mixed-Criticality Systems Based on Time- Triggered Ethernet with Multiple Ring Topologies. University of Siegen Mohammed Abuteir, Roman Obermaisser

Mixed-Criticality Systems Based on Time- Triggered Ethernet with Multiple Ring Topologies. University of Siegen Mohammed Abuteir, Roman Obermaisser Mixed-Criticality s Based on Time- Triggered Ethernet with Multiple Ring Topologies University of Siegen Mohammed Abuteir, Roman Obermaisser Mixed-Criticality s Need for mixed-criticality systems due to

More information

AFDX Emulator for an ARINC-based Training Platform. Jesús Fernández Héctor Pérez J. Javier Gutiérrez Michael González Harbour

AFDX Emulator for an ARINC-based Training Platform. Jesús Fernández Héctor Pérez J. Javier Gutiérrez Michael González Harbour AFDX Emulator for an ARINC-based Training Platform Jesús Fernández Héctor Pérez J. Javier Gutiérrez Michael González Harbour 2 2 Motivation Mature standards for safety-critical applications ARINC-653 for

More information

Protocols and Architecture. Protocol Architecture.

Protocols and Architecture. Protocol Architecture. Protocols and Architecture Protocol Architecture. Layered structure of hardware and software to support exchange of data between systems/distributed applications Set of rules for transmission of data between

More information

Communication Networks. MAP-TELE 2011/12 José Ruela

Communication Networks. MAP-TELE 2011/12 José Ruela Communication Networks MAP-TELE 2011/12 José Ruela Network basic mechanisms Introduction to Communications Networks Communications networks Communications networks are used to transport information (data)

More information

Ethernet A Survey on its Fields of Application

Ethernet A Survey on its Fields of Application Ethernet A Survey on its Fields of Application Fachtagung ITG FA 5.2 "Zukunft der Netze" Jörg Sommer et al. [email protected] 7. Oktober 2010 Universität Stuttgart Institut für Kommunikationsnetze

More information

Boeing B-777. 29.1 Introduction. 29.2 Background. Michael J. Morgan

Boeing B-777. 29.1 Introduction. 29.2 Background. Michael J. Morgan 29 Boeing B-777 Michael J. Morgan Honeywell 29.1 Introduction 29.2 Background 29.3 Boeing 777 Airplane Information Management System (AIMS) 29.4 Cabinet Architecture Overview 29.5 Backplane Bus 29.6 Maintenance

More information

PANDORA FMS NETWORK DEVICE MONITORING

PANDORA FMS NETWORK DEVICE MONITORING NETWORK DEVICE MONITORING pag. 2 INTRODUCTION This document aims to explain how Pandora FMS is able to monitor all network devices available on the marke such as Routers, Switches, Modems, Access points,

More information

Layer 3 Network + Dedicated Internet Connectivity

Layer 3 Network + Dedicated Internet Connectivity Layer 3 Network + Dedicated Internet Connectivity Client: One of the IT Departments in a Northern State Customer's requirement: The customer wanted to establish CAN connectivity (Campus Area Network) for

More information

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet CCNA R&S: Introduction to Networks Chapter 5: Ethernet 5.0.1.1 Introduction The OSI physical layer provides the means to transport the bits that make up a data link layer frame across the network media.

More information

Redundancy in enterprise storage networks using dual-domain SAS configurations

Redundancy in enterprise storage networks using dual-domain SAS configurations Redundancy in enterprise storage networks using dual-domain SAS configurations technology brief Abstract... 2 Introduction... 2 Why dual-domain SAS is important... 2 Single SAS domain... 3 Dual-domain

More information

PANDORA FMS NETWORK DEVICES MONITORING

PANDORA FMS NETWORK DEVICES MONITORING NETWORK DEVICES MONITORING pag. 2 INTRODUCTION This document aims to explain how Pandora FMS can monitor all the network devices available in the market, like Routers, Switches, Modems, Access points,

More information

Service Definition. Internet Service. Introduction. Product Overview. Service Specification

Service Definition. Internet Service. Introduction. Product Overview. Service Specification Service Definition Introduction This Service Definition describes Nexium s from the customer s perspective. In this document the product is described in terms of an overview, service specification, service

More information

Leased Line + Remote Dial-in connectivity

Leased Line + Remote Dial-in connectivity Leased Line + Remote Dial-in connectivity Client: One of the TELCO offices in a Southern state. The customer wanted to establish WAN Connectivity between central location and 10 remote locations. The customer

More information

From Fieldbus to toreal Time Ethernet

From Fieldbus to toreal Time Ethernet Process Automation From Fieldbus to toreal Time Ethernet Safety, reliability IEC61158-2 as the physical layer too slow for Ethernet/IP frames Unsafe cables towards wireless solutions Factory automation

More information

Operating System Concepts. Operating System 資 訊 工 程 學 系 袁 賢 銘 老 師

Operating System Concepts. Operating System 資 訊 工 程 學 系 袁 賢 銘 老 師 Lecture 7: Distributed Operating Systems A Distributed System 7.2 Resource sharing Motivation sharing and printing files at remote sites processing information in a distributed database using remote specialized

More information

IP SAN Best Practices

IP SAN Best Practices IP SAN Best Practices A Dell Technical White Paper PowerVault MD3200i Storage Arrays THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL ERRORS AND TECHNICAL INACCURACIES.

More information

Module 15: Network Structures

Module 15: Network Structures Module 15: Network Structures Background Topology Network Types Communication Communication Protocol Robustness Design Strategies 15.1 A Distributed System 15.2 Motivation Resource sharing sharing and

More information

SAN Conceptual and Design Basics

SAN Conceptual and Design Basics TECHNICAL NOTE VMware Infrastructure 3 SAN Conceptual and Design Basics VMware ESX Server can be used in conjunction with a SAN (storage area network), a specialized high speed network that connects computer

More information

PCI Express Overview. And, by the way, they need to do it in less time.

PCI Express Overview. And, by the way, they need to do it in less time. PCI Express Overview Introduction This paper is intended to introduce design engineers, system architects and business managers to the PCI Express protocol and how this interconnect technology fits into

More information

Objectives of Lecture. Network Architecture. Protocols. Contents

Objectives of Lecture. Network Architecture. Protocols. Contents Objectives of Lecture Network Architecture Show how network architecture can be understood using a layered approach. Introduce the OSI seven layer reference model. Introduce the concepts of internetworking

More information

What is CSG150 about? Fundamentals of Computer Networking. Course Outline. Lecture 1 Outline. Guevara Noubir [email protected].

What is CSG150 about? Fundamentals of Computer Networking. Course Outline. Lecture 1 Outline. Guevara Noubir noubir@ccs.neu. What is CSG150 about? Fundamentals of Computer Networking Guevara Noubir [email protected] CSG150 Understand the basic principles of networking: Description of existing networks, and networking mechanisms

More information

Quality of Service in the Internet. QoS Parameters. Keeping the QoS. Traffic Shaping: Leaky Bucket Algorithm

Quality of Service in the Internet. QoS Parameters. Keeping the QoS. Traffic Shaping: Leaky Bucket Algorithm Quality of Service in the Internet Problem today: IP is packet switched, therefore no guarantees on a transmission is given (throughput, transmission delay, ): the Internet transmits data Best Effort But:

More information

Computer Networks CS321

Computer Networks CS321 Computer Networks CS321 Dr. Ramana I.I.T Jodhpur Dr. Ramana ( I.I.T Jodhpur ) Computer Networks CS321 1 / 22 Outline of the Lectures 1 Introduction OSI Reference Model Internet Protocol Performance Metrics

More information

Per-Flow Queuing Allot's Approach to Bandwidth Management

Per-Flow Queuing Allot's Approach to Bandwidth Management White Paper Per-Flow Queuing Allot's Approach to Bandwidth Management Allot Communications, July 2006. All Rights Reserved. Table of Contents Executive Overview... 3 Understanding TCP/IP... 4 What is Bandwidth

More information

Fibre Channel over Ethernet in the Data Center: An Introduction

Fibre Channel over Ethernet in the Data Center: An Introduction Fibre Channel over Ethernet in the Data Center: An Introduction Introduction Fibre Channel over Ethernet (FCoE) is a newly proposed standard that is being developed by INCITS T11. The FCoE protocol specification

More information

VOICE OVER IP AND NETWORK CONVERGENCE

VOICE OVER IP AND NETWORK CONVERGENCE POZNAN UNIVE RSITY OF TE CHNOLOGY ACADE MIC JOURNALS No 80 Electrical Engineering 2014 Assaid O. SHAROUN* VOICE OVER IP AND NETWORK CONVERGENCE As the IP network was primarily designed to carry data, it

More information

FOUNDATION Fieldbus High Speed Ethernet Control System

FOUNDATION Fieldbus High Speed Ethernet Control System FOUNDATION Fieldbus High Speed Ethernet Control System Sean J. Vincent Fieldbus Inc. Austin, TX, USA KEYWORDS Fieldbus, High Speed Ethernet, H1, ABSTRACT FOUNDATION fieldbus is described in part by the

More information

QoS issues in Voice over IP

QoS issues in Voice over IP COMP9333 Advance Computer Networks Mini Conference QoS issues in Voice over IP Student ID: 3058224 Student ID: 3043237 Student ID: 3036281 Student ID: 3025715 QoS issues in Voice over IP Abstract: This

More information

hp ProLiant network adapter teaming

hp ProLiant network adapter teaming hp networking june 2003 hp ProLiant network adapter teaming technical white paper table of contents introduction 2 executive summary 2 overview of network addressing 2 layer 2 vs. layer 3 addressing 2

More information

Network-Oriented Software Development. Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2

Network-Oriented Software Development. Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2 Network-Oriented Software Development Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2 Topics Layering TCP/IP Layering Internet addresses and port numbers Encapsulation

More information

Transport and Network Layer

Transport and Network Layer Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a

More information

Network Programming TDC 561

Network Programming TDC 561 Network Programming TDC 561 Lecture # 1 Dr. Ehab S. Al-Shaer School of Computer Science & Telecommunication DePaul University Chicago, IL 1 Network Programming Goals of this Course: Studying, evaluating

More information

How To Design A Layered Network In A Computer Network

How To Design A Layered Network In A Computer Network A Layered Approach to Computer Networks Physical Layer Data Link Layer Network Layer Transport Layer Session Layer Presentation Layer Application Layer Different layer of abstraction Different error control

More information

Chapter 2 - The TCP/IP and OSI Networking Models

Chapter 2 - The TCP/IP and OSI Networking Models Chapter 2 - The TCP/IP and OSI Networking Models TCP/IP : Transmission Control Protocol/Internet Protocol OSI : Open System Interconnection RFC Request for Comments TCP/IP Architecture Layers Application

More information

Chapter 14: Distributed Operating Systems

Chapter 14: Distributed Operating Systems Chapter 14: Distributed Operating Systems Chapter 14: Distributed Operating Systems Motivation Types of Distributed Operating Systems Network Structure Network Topology Communication Structure Communication

More information

The OSI Model: Understanding the Seven Layers of Computer Networks

The OSI Model: Understanding the Seven Layers of Computer Networks Expert Reference Series of White Papers The OSI Model: Understanding the Seven Layers of Computer Networks 1-800-COURSES www.globalknowledge.com The OSI Model: Understanding the Seven Layers of Computer

More information

Industrial Communication Whitepaper. Principles of EtherNet/IP Communication

Industrial Communication Whitepaper. Principles of EtherNet/IP Communication Industrial Communication Whitepaper Principles of EtherNet/IP Communication 1 Contents Introduction...3 Producer/Consumer Model...4 EtherNet/IP Messaging Types...7 Real Time Data Exchanges...9 Typical

More information

Chapter 16: Distributed Operating Systems

Chapter 16: Distributed Operating Systems Module 16: Distributed ib System Structure, Silberschatz, Galvin and Gagne 2009 Chapter 16: Distributed Operating Systems Motivation Types of Network-Based Operating Systems Network Structure Network Topology

More information

Chapter 1 Reading Organizer

Chapter 1 Reading Organizer Chapter 1 Reading Organizer After completion of this chapter, you should be able to: Describe convergence of data, voice and video in the context of switched networks Describe a switched network in a small

More information

VMWARE WHITE PAPER 1

VMWARE WHITE PAPER 1 1 VMWARE WHITE PAPER Introduction This paper outlines the considerations that affect network throughput. The paper examines the applications deployed on top of a virtual infrastructure and discusses the

More information

White paper. Reliable and Scalable TETRA networks

White paper. Reliable and Scalable TETRA networks Abstract The evolution of TETRA networks towards an all- IP architecture is now a reality and has been accepted by even the most demanding users of TETRA technology. Although circuit switch based TETRA

More information

Generic term for using the Ethernet standard in automation / industrial applications

Generic term for using the Ethernet standard in automation / industrial applications Seite 24 Industrial Ethernet Generic term for using the Ethernet standard in automation / industrial applications Specific Quality of Service requirements Real-time Cycle time (e.g. < 1 ms for motion control

More information

The Advantages of Multi-Port Network Adapters in an SWsoft Virtual Environment

The Advantages of Multi-Port Network Adapters in an SWsoft Virtual Environment The Advantages of Multi-Port Network Adapters in an SWsoft Virtual Environment Introduction... 2 Virtualization addresses key challenges facing IT today... 2 Introducing Virtuozzo... 2 A virtualized environment

More information

Introduction To Computer Networking

Introduction To Computer Networking Introduction To Computer Networking Alex S. 1 Introduction 1.1 Serial Lines Serial lines are generally the most basic and most common communication medium you can have between computers and/or equipment.

More information

Three Key Design Considerations of IP Video Surveillance Systems

Three Key Design Considerations of IP Video Surveillance Systems Three Key Design Considerations of IP Video Surveillance Systems 2012 Moxa Inc. All rights reserved. Three Key Design Considerations of IP Video Surveillance Systems Copyright Notice 2012 Moxa Inc. All

More information

MLPPP Deployment Using the PA-MC-T3-EC and PA-MC-2T3-EC

MLPPP Deployment Using the PA-MC-T3-EC and PA-MC-2T3-EC MLPPP Deployment Using the PA-MC-T3-EC and PA-MC-2T3-EC Overview Summary The new enhanced-capability port adapters are targeted to replace the following Cisco port adapters: 1-port T3 Serial Port Adapter

More information

Cisco Integrated Services Routers Performance Overview

Cisco Integrated Services Routers Performance Overview Integrated Services Routers Performance Overview What You Will Learn The Integrated Services Routers Generation 2 (ISR G2) provide a robust platform for delivering WAN services, unified communications,

More information

Maximizing Server Storage Performance with PCI Express and Serial Attached SCSI. Article for InfoStor November 2003 Paul Griffith Adaptec, Inc.

Maximizing Server Storage Performance with PCI Express and Serial Attached SCSI. Article for InfoStor November 2003 Paul Griffith Adaptec, Inc. Filename: SAS - PCI Express Bandwidth - Infostor v5.doc Maximizing Server Storage Performance with PCI Express and Serial Attached SCSI Article for InfoStor November 2003 Paul Griffith Adaptec, Inc. Server

More information

Ethernet. Ethernet. Network Devices

Ethernet. Ethernet. Network Devices Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking

More information

Requirements of Voice in an IP Internetwork

Requirements of Voice in an IP Internetwork Requirements of Voice in an IP Internetwork Real-Time Voice in a Best-Effort IP Internetwork This topic lists problems associated with implementation of real-time voice traffic in a best-effort IP internetwork.

More information

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life Overview Dipl.-Ing. Peter Schrotter Institute of Communication Networks and Satellite Communications Graz University of Technology, Austria Fundamentals of Communicating over the Network Application Layer

More information

Overview of Computer Networks

Overview of Computer Networks Overview of Computer Networks Client-Server Transaction Client process 4. Client processes response 1. Client sends request 3. Server sends response Server process 2. Server processes request Resource

More information

REMOTE MONITORING MATRIX

REMOTE MONITORING MATRIX 802.1ag/Y.1731 BASIC ADVANCED 802.3ah Link 802.1ag/Y.1731 RFC 2544 REMOTE MONITORING MATRIX Featuring a matrix of different features that will help you identify and select which Transition products best

More information

Process Control and Automation using Modbus Protocol

Process Control and Automation using Modbus Protocol Process Control and Automation using Modbus Protocol Modbus is the fundamental network protocol used in most industrial applications today. It is universal, open and an easy to use protocol. Modbus has

More information

High Speed I/O Server Computing with InfiniBand

High Speed I/O Server Computing with InfiniBand High Speed I/O Server Computing with InfiniBand José Luís Gonçalves Dep. Informática, Universidade do Minho 4710-057 Braga, Portugal [email protected] Abstract: High-speed server computing heavily relies on

More information

Data Link Protocols. TCP/IP Suite and OSI Reference Model

Data Link Protocols. TCP/IP Suite and OSI Reference Model Data Link Protocols Relates to Lab. This module covers data link layer issues, such as local area networks (LANs) and point-to-point links, Ethernet, and the Point-to-Point Protocol (PPP). 1 TCP/IP Suite

More information

Intel Ethernet Switch Converged Enhanced Ethernet (CEE) and Datacenter Bridging (DCB) Using Intel Ethernet Switch Family Switches

Intel Ethernet Switch Converged Enhanced Ethernet (CEE) and Datacenter Bridging (DCB) Using Intel Ethernet Switch Family Switches Intel Ethernet Switch Converged Enhanced Ethernet (CEE) and Datacenter Bridging (DCB) Using Intel Ethernet Switch Family Switches February, 2009 Legal INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION

More information

White Paper. Requirements of Network Virtualization

White Paper. Requirements of Network Virtualization White Paper on Requirements of Network Virtualization INDEX 1. Introduction 2. Architecture of Network Virtualization 3. Requirements for Network virtualization 3.1. Isolation 3.2. Network abstraction

More information

Communications and Computer Networks

Communications and Computer Networks SFWR 4C03: Computer Networks and Computer Security January 5-8 2004 Lecturer: Kartik Krishnan Lectures 1-3 Communications and Computer Networks The fundamental purpose of a communication system is the

More information

The proliferation of the raw processing

The proliferation of the raw processing TECHNOLOGY CONNECTED Advances with System Area Network Speeds Data Transfer between Servers with A new network switch technology is targeted to answer the phenomenal demands on intercommunication transfer

More information

This topic lists the key mechanisms use to implement QoS in an IP network.

This topic lists the key mechanisms use to implement QoS in an IP network. IP QoS Mechanisms QoS Mechanisms This topic lists the key mechanisms use to implement QoS in an IP network. QoS Mechanisms Classification: Each class-oriented QoS mechanism has to support some type of

More information

What is VLAN Routing?

What is VLAN Routing? Application Note #38 February 2004 What is VLAN Routing? This Application Notes relates to the following Dell product(s): 6024 and 6024F 33xx Abstract Virtual LANs (VLANs) offer a method of dividing one

More information

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols Guide to TCP/IP, Third Edition Chapter 3: Data Link and Network Layer TCP/IP Protocols Objectives Understand the role that data link protocols, such as SLIP and PPP, play for TCP/IP Distinguish among various

More information

STANDPOINT FOR QUALITY-OF-SERVICE MEASUREMENT

STANDPOINT FOR QUALITY-OF-SERVICE MEASUREMENT STANDPOINT FOR QUALITY-OF-SERVICE MEASUREMENT 1. TIMING ACCURACY The accurate multi-point measurements require accurate synchronization of clocks of the measurement devices. If for example time stamps

More information

Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet

Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet Basic Networking Concepts 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet 1 1. Introduction -A network can be defined as a group of computers and other devices connected

More information

Improving Quality of Service

Improving Quality of Service Improving Quality of Service Using Dell PowerConnect 6024/6024F Switches Quality of service (QoS) mechanisms classify and prioritize network traffic to improve throughput. This article explains the basic

More information

Management Software. Web Browser User s Guide AT-S106. For the AT-GS950/48 Gigabit Ethernet Smart Switch. Version 1.0.0. 613-001339 Rev.

Management Software. Web Browser User s Guide AT-S106. For the AT-GS950/48 Gigabit Ethernet Smart Switch. Version 1.0.0. 613-001339 Rev. Management Software AT-S106 Web Browser User s Guide For the AT-GS950/48 Gigabit Ethernet Smart Switch Version 1.0.0 613-001339 Rev. A Copyright 2010 Allied Telesis, Inc. All rights reserved. No part of

More information

IP Network Layer. Datagram ID FLAG Fragment Offset. IP Datagrams. IP Addresses. IP Addresses. CSCE 515: Computer Network Programming TCP/IP

IP Network Layer. Datagram ID FLAG Fragment Offset. IP Datagrams. IP Addresses. IP Addresses. CSCE 515: Computer Network Programming TCP/IP CSCE 515: Computer Network Programming TCP/IP IP Network Layer Wenyuan Xu Department of Computer Science and Engineering University of South Carolina IP Datagrams IP is the network layer packet delivery

More information

Technical Solution & White Paper. AFDX/ARINC664 End System Testing JS, AIM GmbH 9.7.2012

Technical Solution & White Paper. AFDX/ARINC664 End System Testing JS, AIM GmbH 9.7.2012 Technical Solution & White Paper AFDX/ARINC664 End System Testing JS, AIM GmbH 9.7.2012 Page 1 General Following Paper outlines the AIM approach for testing AFDX/ARINC664 End Systems against the ARINC664

More information

WHITE PAPER. Enabling 100 Gigabit Ethernet Implementing PCS Lanes

WHITE PAPER. Enabling 100 Gigabit Ethernet Implementing PCS Lanes WHITE PAPER Enabling 100 Gigabit Ethernet Implementing PCS Lanes www.ixiacom.com 915-0909-01 Rev. C, January 2014 2 Table of Contents Introduction... 4 The IEEE 802.3 Protocol Stack... 4 PCS Layer Functions...

More information

The OSI and TCP/IP Models. Lesson 2

The OSI and TCP/IP Models. Lesson 2 The OSI and TCP/IP Models Lesson 2 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Introduction to the OSI Model Compare the layers of the OSI and TCP/IP

More information

Network Monitoring White Paper

Network Monitoring White Paper Network ing White Paper ImageStream Internet Solutions, Inc. 7900 East 8th Road Plymouth, Indiana 46563 http://www.imagestream.com [email protected] Phone: 574.935.8484 Sales: 800.813.5123 Fax: 574.935.8488

More information

Remote Serial over IP Introduction on serial connections via IP/Ethernet

Remote Serial over IP Introduction on serial connections via IP/Ethernet Remote Serial over IP Introduction on serial connections via IP/Ethernet TABLE OF CONTENT TABLE OF CONTENT... I TABLE OF IMAGES... I INTRODUCTION... 1 Classic Style of Communication... 1 Ethernet and

More information

CORPORATE NETWORKING

CORPORATE NETWORKING CORPORATE NETWORKING C. Pham Université de Pau et des Pays de l Adour Département Informatique http://www.univ-pau.fr/~cpham [email protected] Typical example of Ethernet local networks Mostly based

More information

Using & Offering Wholesale Ethernet Network and Operational Considerations

Using & Offering Wholesale Ethernet Network and Operational Considerations White Paper Using and Offering Wholesale Ethernet Using & Offering Wholesale Ethernet Network and Operational Considerations Introduction Business services customers are continuing to migrate to Carrier

More information

Virtual KNX/EIB devices in IP networks

Virtual KNX/EIB devices in IP networks WEINZIERL ENGINEERING GmbH WEINZIERL ENGINEERING GMBH F. Heiny, Dr. Y. Kyselytsya, Dr. Th. Weinzierl Bahnhofstr. 6 D-84558 Tyrlaching Tel. +49 (0) 8623 / 987 98-03 E-Mail: [email protected] Web: www.weinzierl.de

More information

PROFINET the Industrial Ethernet standard. Siemens AG 2013. Alle Rechte vorbehalten.

PROFINET the Industrial Ethernet standard. Siemens AG 2013. Alle Rechte vorbehalten. the Industrial Ethernet standard is 100% Ethernet is Ethernet Ethernet is the established standard in the IT world for fast exchange of data (IEEE 802.3) is always full duplex simultaneous communication

More information

Application Note Gigabit Ethernet Port Modes

Application Note Gigabit Ethernet Port Modes Application Note Gigabit Ethernet Port Modes Application Note Gigabit Ethernet Port Modes Table of Contents Description... 3 Benefits... 4 Theory of Operation... 4 Interaction with Other Features... 7

More information

Security Overview of the Integrity Virtual Machines Architecture

Security Overview of the Integrity Virtual Machines Architecture Security Overview of the Integrity Virtual Machines Architecture Introduction... 2 Integrity Virtual Machines Architecture... 2 Virtual Machine Host System... 2 Virtual Machine Control... 2 Scheduling

More information

From Ethernet Ubiquity to Ethernet Convergence: The Emergence of the Converged Network Interface Controller

From Ethernet Ubiquity to Ethernet Convergence: The Emergence of the Converged Network Interface Controller White Paper From Ethernet Ubiquity to Ethernet Convergence: The Emergence of the Converged Network Interface Controller The focus of this paper is on the emergence of the converged network interface controller

More information

QoS Parameters. Quality of Service in the Internet. Traffic Shaping: Congestion Control. Keeping the QoS

QoS Parameters. Quality of Service in the Internet. Traffic Shaping: Congestion Control. Keeping the QoS Quality of Service in the Internet Problem today: IP is packet switched, therefore no guarantees on a transmission is given (throughput, transmission delay, ): the Internet transmits data Best Effort But:

More information

Smart Tips. Enabling WAN Load Balancing. Key Features. Network Diagram. Overview. Featured Products. WAN Failover. Enabling WAN Load Balancing Page 1

Smart Tips. Enabling WAN Load Balancing. Key Features. Network Diagram. Overview. Featured Products. WAN Failover. Enabling WAN Load Balancing Page 1 Smart Tips Enabling WAN Load Balancing Overview Many small businesses today use broadband links such as DSL or Cable, favoring them over the traditional link such as T1/E1 or leased lines because of the

More information

Virtualization: TCP/IP Performance Management in a Virtualized Environment Orlando Share Session 9308

Virtualization: TCP/IP Performance Management in a Virtualized Environment Orlando Share Session 9308 Virtualization: TCP/IP Performance Management in a Virtualized Environment Orlando Share Session 9308 Laura Knapp WW Business Consultant [email protected] Applied Expert Systems, Inc. 2011 1 Background

More information

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software Local Area What s a LAN? A transmission system, usually private owned, very speedy and secure, covering a geographical area in the range of kilometres, comprising a shared transmission medium and a set

More information

Monitoring Traffic manager

Monitoring Traffic manager Monitoring Traffic manager eg Enterprise v6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this document may be reproduced

More information

Avaya ExpertNet Lite Assessment Tool

Avaya ExpertNet Lite Assessment Tool IP Telephony Contact Centers Mobility Services WHITE PAPER Avaya ExpertNet Lite Assessment Tool April 2005 avaya.com Table of Contents Overview... 1 Network Impact... 2 Network Paths... 2 Path Generation...

More information

10/100/1000 Ethernet MAC with Protocol Acceleration MAC-NET Core

10/100/1000 Ethernet MAC with Protocol Acceleration MAC-NET Core 1 Introduction The implements, in conjunction with a triple speed 10/100/1000 MAC, Layer 3 network acceleration functions, which are designed to accelerate the processing of various common networking protocols

More information

HP network adapter teaming: load balancing in ProLiant servers running Microsoft Windows operating systems

HP network adapter teaming: load balancing in ProLiant servers running Microsoft Windows operating systems HP network adapter teaming: load balancing in ProLiant servers running Microsoft Windows operating systems white paper Introduction... 2 Overview of teaming and load balancing... 2 Transmit Load Balancing...

More information

Lustre Networking BY PETER J. BRAAM

Lustre Networking BY PETER J. BRAAM Lustre Networking BY PETER J. BRAAM A WHITE PAPER FROM CLUSTER FILE SYSTEMS, INC. APRIL 2007 Audience Architects of HPC clusters Abstract This paper provides architects of HPC clusters with information

More information

ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK

ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK Contemporary Control Systems, Inc. Understanding Ethernet Switches and Routers This extended article was based on a two-part article that was

More information

APPLICATION NOTE 210 PROVIDER BACKBONE BRIDGE WITH TRAFFIC ENGINEERING: A CARRIER ETHERNET TECHNOLOGY OVERVIEW

APPLICATION NOTE 210 PROVIDER BACKBONE BRIDGE WITH TRAFFIC ENGINEERING: A CARRIER ETHERNET TECHNOLOGY OVERVIEW PROVIDER BACKBONE BRIDGE WITH TRAFFIC ENGINEERING: A CARRIER ETHERNET TECHNOLOGY OVERVIEW By Thierno Diallo, Product Specialist Originally designed as a local-area network (LAN) communication protocol,

More information

ADVANCED NETWORK CONFIGURATION GUIDE

ADVANCED NETWORK CONFIGURATION GUIDE White Paper ADVANCED NETWORK CONFIGURATION GUIDE CONTENTS Introduction 1 Terminology 1 VLAN configuration 2 NIC Bonding configuration 3 Jumbo frame configuration 4 Other I/O high availability options 4

More information

Clearing the Way for VoIP

Clearing the Way for VoIP Gen2 Ventures White Paper Clearing the Way for VoIP An Alternative to Expensive WAN Upgrades Executive Overview Enterprises have traditionally maintained separate networks for their voice and data traffic.

More information

Protocols. Packets. What's in an IP packet

Protocols. Packets. What's in an IP packet Protocols Precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet Protocol (bottom level) all packets shipped from network to network as IP packets

More information